| 2015 | 21st IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2015, Zhangjiajie, China, November 18-20, 2015 Guojun Wang, Tatsuhiro Tsuchiya, Dong Xiang |
| 2015 | A Dual-FPGA Architecture with Rejuvenation for Realtime Applications. Aromhack Saysanasongkham, Satoshi Fukumoto |
| 2015 | A Method of Diagnostic Test Generation for Transition Faults. Renji Ono, Satoshi Ohtake |
| 2015 | A Method of Self-Adaptive Pre-Copy Container Checkpoint. Xiao Chen, Jian-Hui Jiang, Qu Jiang |
| 2015 | A Personalized Access Control Based on IoT. Jae J. Jang, Jaekun Moon, Im Young Jung |
| 2015 | A Scalable Optimization Framework for Storage Backup Operations Using Markov Decision Processes. Ruofan Xia, Fumio Machida, Kishor S. Trivedi |
| 2015 | A Smart Fuzzing Method for Detecting Heap-Based Buffer Overflow in Executable Codes. Maryam Mouzarani, Babak Sadeghiyan, Mohammad Zolfaghari |
| 2015 | A Survey on Data Quality: Classifying Poor Data. Nuno Laranjeiro, Seyma Nur Soydemir, Jorge Bernardino |
| 2015 | A Transformational Approach for the Hardening of Region-Adherent Algorithms. Dilshod Rahmatov, Jan Steffen Becker, Oliver E. Theel |
| 2015 | ARMOR: Adaptive Reliability Management by On-the-Fly Redundancy in Multicore Embedded Processors. Farshad Baharvand, Seyed Ghassem Miremadi |
| 2015 | Analyzing the Effectiveness of Privacy Related Add-Ons Employed to Thwart Web Based Tracking. Matthew Ruffell, Jin B. Hong, Dong Seong Kim |
| 2015 | Application-Oriented Sensor Network Architecture for Dependable Structural Health Monitoring. Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Xiaofei Xing, Xiangyong Liu |
| 2015 | Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks. Chen Gu, Matthew Bradbury, Arshad Jhumka, Matthew Leeke |
| 2015 | Availability Modeling and Analysis for Software Defined Networks. Tuan Anh Nguyen, Taehoon Eom, SeongMo An, Jong Sou Park, Jin B. Hong, Dong Seong Kim |
| 2015 | Bayesian Analysis for Software Reliability with Fault Detection and Correction Data. Lujia Wang, Qingpei Hu, Min Xie |
| 2015 | Combining Low IO-Operations During Data Recovery with Low Parity Overhead in Two-Failure Tolerant Archival Storage Systems. Thomas J. E. Schwarz, Ahmed Amer, Jehan-François Pâris |
| 2015 | Component Importance Measures for Real-Time Computing Systems in the Presence of Common-Cause Failures. Junjun Zheng, Hiroyuki Okamura, Tadashi Dohi |
| 2015 | Cooperative Exceptions for Concurrent Objects. Bruno Cabral, Alcides Fonseca, Paulo Marques, Jonathan Aldrich |
| 2015 | Cyber-Physical Topology Language: Definition, Operations, and Application. Carmen Cheh, Gabriel A. Weaver, William H. Sanders |
| 2015 | Deriving Hierarchical Safety Contracts. Omar Jaradat, Iain Bate |
| 2015 | Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity Monitoring. Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Guillaume Averlant |
| 2015 | Differentiated Failure Remediation with Action Selection for Resilient Computing. Song Huang, Song Fu, Nathan DeBardeleben, Qiang Guan, Cheng-Zhong Xu |
| 2015 | Eventual Leader Election Despite Crash-Recovery and Omission Failures. Christian Fernández-Campusano, Mikel Larrea, Roberto Cortiñas, Michel Raynal |
| 2015 | Experimental Evaluation of Stealthy Attack Detection in a Robot. Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya P. Mathur |
| 2015 | FIRED - Fault Injector for Reconfigurable Embedded Devices. Jose Luis Nunes, Tamas Pecserke, João Carlos Cunha, Mário Zenha Rela |
| 2015 | Failure Analyses of Communications Systems and Networks by Publicly Available Failure Information from the viewpoint of Dependability. Koichi Bando, Yutaka Matsuno, Kenji Tanaka |
| 2015 | Failure Recovery Cost Reduction of Disk Arrays Using Adaptive Erasure Correction Coding and Data Compression. Haruhiko Kaneko |
| 2015 | Hardware Fault Compensation Using Discriminative Learning. Farah Naz Taher, Joseph Callenes-Sloan |
| 2015 | Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios. Sumeet Jauhar, Binbin Chen, William G. Temple, Xinshu Dong, Zbigniew T. Kalbarczyk, William H. Sanders, David M. Nicol |
| 2015 | NIRVANA: A Non-intrusive Black-Box Monitoring Framework for Rack-Level Fault Detection. Claudio Ciccotelli, Leonardo Aniello, Federico Lombardi, Luca Montanari, Leonardo Querzoni, Roberto Baldoni |
| 2015 | Optimizing Sensor Nodes Placement for Fault-Tolerant Trilateration-Based Localization. Katarina Balac, Mauro Prevostini, Miroslaw Malek |
| 2015 | Parasitic Parameters Impacts Investigation on Soft Error Rate by a Circuit Level Framework. Weiguang Sheng, Zhongyuan Zhao, Zhigang Mao |
| 2015 | SYNDICATE: Software Platform for Distributed Real-Time System. Eunji Pak, Young-Mok Ha, Jeman Park, Yongyeon Kim, Moonsub Song, Taeho Kim |
| 2015 | Scheduling Independent Tasks with Voltage Overscaling. Aurélien Cavelan, Yves Robert, Hongyang Sun, Frédéric Vivien |
| 2015 | Software Rejuvenation Schemes for Time Warp-Based PDES. Satoshi Fukumoto, Mamoru Ohara |
| 2015 | Survivability Quantification of Wireless Ad Hoc Network Taking Account of Border Effects. Zhipeng Yi, Tadashi Dohi, Hiroyuki Okamura |
| 2015 | TREBIVETM: A TREe Based Integrity Verification Environment for Non-volatile Memory System. Mikio Hashimoto, Naoko Yamada, Jun Kanai |
| 2015 | Triple Failure Tolerant Storage Systems Using Only Exclusive-Or Parity Calculations. Thomas J. E. Schwarz, Darrell D. E. Long, Jehan-François Pâris |
| 2015 | Unifying Dependability of Critical Infrastructures: Electric Power System and ICT: Concepts, Figures of Merit and Taxonomy. Igor Kaitovic, Slobodan Lukovic, Miroslaw Malek |
| 2015 | Using Safety Contracts to Guide the Integration of Reusable Safety Elements within ISO 26262. Irfan Sljivo, Barbara Gallina, Jan Carlson, Hans Hansson |